From: Yonghong Song <yonghong.song@linux.dev>
To: Andrii Nakryiko <andrii.nakryiko@gmail.com>
Cc: bpf@vger.kernel.org, Alexei Starovoitov <ast@kernel.org>,
Andrii Nakryiko <andrii@kernel.org>,
Daniel Borkmann <daniel@iogearbox.net>,
kernel-team@fb.com, Martin KaFai Lau <martin.lau@kernel.org>
Subject: Re: [PATCH bpf-next] selftests/bpf: Fix flaky test ptr_untrusted
Date: Mon, 5 Feb 2024 22:37:56 -0800 [thread overview]
Message-ID: <d92b0371-6d36-4296-b920-28bea1f5fd07@linux.dev> (raw)
In-Reply-To: <CAEf4BzZhg13E=-z1yUKwtiXOeNwaA8m5N_jaTW_DRGV7ZdFE9A@mail.gmail.com>
On 2/5/24 10:56 AM, Andrii Nakryiko wrote:
> On Sun, Feb 4, 2024 at 11:45 AM Yonghong Song <yonghong.song@linux.dev> wrote:
>> Somehow recently I frequently hit the following test failure
>> with either ./test_progs or ./test_progs-cpuv4:
>> serial_test_ptr_untrusted:PASS:skel_open 0 nsec
>> serial_test_ptr_untrusted:PASS:lsm_attach 0 nsec
>> serial_test_ptr_untrusted:PASS:raw_tp_attach 0 nsec
>> serial_test_ptr_untrusted:FAIL:cmp_tp_name unexpected cmp_tp_name: actual -115 != expected 0
>> #182 ptr_untrusted:FAIL
>>
>> Further investigation found the failure is due to
>> bpf_probe_read_user_str()
>> where reading user-level string attr->raw_tracepoint.name
>> is not successfully, most likely due to the
>> string itself still in disk and not populated into memory yet.
>>
>> One solution is do a printf() call of the string before doing bpf
>> syscall which will force the raw_tracepoint.name into memory.
>> But I think a more robust solution is to use bpf_copy_from_user()
>> which is used in sleepable program and can tolerate page fault,
>> and the fix here used the latter approach.
>>
>> Signed-off-by: Yonghong Song <yonghong.song@linux.dev>
>> ---
>> tools/testing/selftests/bpf/progs/test_ptr_untrusted.c | 6 +++---
>> 1 file changed, 3 insertions(+), 3 deletions(-)
>>
>> diff --git a/tools/testing/selftests/bpf/progs/test_ptr_untrusted.c b/tools/testing/selftests/bpf/progs/test_ptr_untrusted.c
>> index 4bdd65b5aa2d..2fdc44e76624 100644
>> --- a/tools/testing/selftests/bpf/progs/test_ptr_untrusted.c
>> +++ b/tools/testing/selftests/bpf/progs/test_ptr_untrusted.c
>> @@ -6,13 +6,13 @@
>>
>> char tp_name[128];
>>
>> -SEC("lsm/bpf")
>> +SEC("lsm.s/bpf")
>> int BPF_PROG(lsm_run, int cmd, union bpf_attr *attr, unsigned int size)
>> {
>> switch (cmd) {
>> case BPF_RAW_TRACEPOINT_OPEN:
>> - bpf_probe_read_user_str(tp_name, sizeof(tp_name) - 1,
>> - (void *)attr->raw_tracepoint.name);
>> + bpf_copy_from_user(tp_name, sizeof(tp_name) - 1,
>> + (void *)attr->raw_tracepoint.name);
> Should we also add bpf_copy_from_user_str (and
> bpf_copy_from_user_str_task) kfuncs to complete bpf_copy_from_user?
> This change is not strictly equivalent (though for tests it's fine,
> but in real-world apps it would be problematic).
Sounds a good idea. Let me do some investigations!
>
>> break;
>> default:
>> break;
>> --
>> 2.34.1
>>
prev parent reply other threads:[~2024-02-06 6:38 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-02-04 19:44 [PATCH bpf-next] selftests/bpf: Fix flaky test ptr_untrusted Yonghong Song
2024-02-05 18:50 ` patchwork-bot+netdevbpf
2024-02-05 18:56 ` Andrii Nakryiko
2024-02-06 6:37 ` Yonghong Song [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=d92b0371-6d36-4296-b920-28bea1f5fd07@linux.dev \
--to=yonghong.song@linux.dev \
--cc=andrii.nakryiko@gmail.com \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=kernel-team@fb.com \
--cc=martin.lau@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox